Lecture 18 HACKING (CONTINUED). WHY DO PEOPLE HACK ?  JUST FOR FUN.  SHOW OF THEIR KNOWLEDGE.  HACK OTHER SYSTEM SECRETLY.  DESTROY ENEMY’S COMPUTER.

Slides:



Advertisements
Similar presentations
Technology Made Easy!! Telnet and Voice over internet Protocol(VOIP) By: Nicolette Johnson Peta-Lee Richards.
Advertisements

PowerPoint presentation of first 25 pages of instructional manual Edith Fabiyi Essentials of Internet Access.
1 Ports and IPv6. 2 Ports Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), used for communication Generally speaking, a computer.
CS682- Network Management and Security Prof. Katz.
Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system.
Exploits Dalia Solomon. Categories Trojan Horse Attacks Trojan Horse Attacks Smurf Attack Smurf Attack Port Scan Port Scan Buffer Overflow Buffer Overflow.
Hacking And Cracking ICT Project.
SSH: An Internet Protocol By Anja Kastl IS World Wide Web Standards.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Computer Security and Penetration Testing
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Guide to TCP/IP, Second Edition1 Guide To TCP/IP, Second Edition Chapter 6 Basic TCP/IP Services.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
The Truth About Protecting Passwords COEN 150: Intro to Information Security Mary Le Carol Reiley.
Project Presentation Supervisor:Prof Dr Zubair Ahmad Khan Group : Inaamul-Haq-Mansoor (Leader) (S454845) Nadeem (S454843) Kamran Khaliq (S455118) Ghulam.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Secure Shell for Computer Science Nick Czebiniak Sung-Ho Maeung.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 23 How Web Host Servers Work.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
1 Version 3.0 Module 11 TCP Application and Transport.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
CHAPTER 5 TCP/IP PROTOCOLS. P ROTOCOL STANDARDS Protocols are formal rules of behavior When computers communicate, it is necessary to define a set of.
Network Monitor By Zhenhong Zhao. What is the Network Monitor? The Network Monitor is a tool that gets information off of the host on the LAN. – Enumerating.
CHAPTER 9 Sniffing.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Introduction to Student Name Student Class.
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
1 CS4550 Computer Networks II Topics In Applications Ref: Feit Chap Tanenbaum Chap 7.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
General rules 1. Rule: 2. Rule: 3. Rule: 10. Rule: Ask questions ……………………. 11. Rule: I do not know your skill. If I tell you things you know, please stop.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
Accessing Evitech network via FTP by Susan Jansson.
Chapter 5 Common Internet Tools. How Gophers Work? Internet Gopher: Client software, to find Internet files and other resources easily Organize information.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
Agenda Overview of Seneca Computer System File Servers / Student Computer Accounts Telnet application How to Logon to Learn / Phobos accounts How to Change.
Introduction to Secure Shell Greg Porter Data Processing Manager USPFO For California.
Firewalls Fighting Spyware, Viruses, and Malware Ch 5.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
TCP/IP Protocol Suite ©Richard L. Goldman September 25, 2002.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Filip Chytrý Everyone of you in here can help us improve online security....
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
Week-10 (Lecture-1) Web Building STEPS OF BUILDING: create web pages using HTML add a consistent style using CSS add computer code using JavaScript add.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Top 10 Hacking Tool Welcome TO hackaholic Kumar shubham.
Week-3 (Lecture-1). Some Important internet terms: Archie : A program used to search files at FTP sites. There are currently 30 Archie servers in the.
Enumeration.
Instructor Materials Chapter 5 Providing Network Services
TCP/IP Utilities Richard Goldman May 29, 2003.
Backdoor Attacks.
Some bits on how it works
Introduction to Networking
Chapter 2: Basic Switching Concepts and Configuration
Firewalls Routers, Switches, Hubs VPNs
Radoslaw Jedynak, PhD Poland, Technical University of Radom
Protocols 2 Key Revision Points.
Remote Computing Services Cloud connection Distributed system
Introduction to Client/Server Computing
Computer Networks Protocols
Presentation transcript:

Lecture 18 HACKING (CONTINUED)

WHY DO PEOPLE HACK ?  JUST FOR FUN.  SHOW OF THEIR KNOWLEDGE.  HACK OTHER SYSTEM SECRETLY.  DESTROY ENEMY’S COMPUTER NETWORK DURING THE WAR.  FOR PROFIT PEOPLE PAYS A CRACKER.  CRACK FOR SAKE OF CURIOCITY.

THE PSYCOLOGY OF HACKERS  ALL INFORMATION SHOULD BE FREE.  ACCESS TO COMPUTER SHOULD BE UNLIMITED AND FREE.  IT CAN CHANGE LIFE FOR BETTER.  IT CAN CREATE BEAUTY ON COMPUTER.

TYPES OF HACKING  THERE ARE MANY TYPES OF HACKING LIKE PASSWORD HACKING SOFTWARE HACKING NET HACKING

PASSWORD HACKING  TWO TYPES 1.BRUTE FORCE IN THAT CASE HACKERS TRY OUT ALL THE COMBINATION OF ALL KEYBOARD LETTERS.IT HAS GRATER SUCCESS BUT IT TAKES LONG TIME 2.DICTIONARY BASED IN THAT THEY ARE USE PREDEFINE PASSWORD.IT IS UNSUCCESSFUL METHOD

SOFTWARE HACKING  IN THAT HACKERS CHANGES THE LOOK & EXCUTION WAY OF THAT SOFTWARE  CHANG THE DEMO VERSION INTO FULL VERSION BY DECODING THE SOURCE CODE

IP ADDRESS  IP ADDRESS IS THE ADDRESS OF YOUR COMPUTER IN THE INTERNET  IT IS UNIQ  LIKE

PORT  IT IS NOT PHYSICAL PORT BUT IT IS LOGICAL PORT IN YOUR COMPUTER  IT IS JUST LIKE HOLE ONTO THE SYSTEM.THROUGH HACKER CAN ENTER  THERE ARE THOUSANDS OF PORTS INTO COMPUTER  THE PETICULAR SERVICE IS RUNNING ON PERTICULAR PORT  LIKE PORT 21 : FTP PORT 23 : TELNET PORT 80 : HTTP PORT 25 : MAIL

HACKING TOOLS  THERE ARE MANY TOOLS ARE AVILABLE SCANNERS TELNET FTP LAN WATCH

SCANNERS  IT IS NOT A PHOTO SCANNER  SCANNER IS PROGRAM THAT AUTOMATICALLY DETECTS SECURITY WEAKNESS IN REMOTE HOST  PORT SCANNERS ARE USED IN HACKING  PORT SCANNER CAN GIVE THE WHOLE LIST OF OPEN PORT ON THAT SYSTEM AND WHICH SERVICE IS RUNNING ON THAT  IT CAN USE ALMOST ALL OPERATING SYSTEM  EX. SATAN,NMAP

TELNET  TELNET IS ULTIMATE HACKING TOOL  IT IS TERMINAL EMULATION PROGRAM THAT ALLOWS US TO CONNECT TO REMOTE SYSTEM  YOU HAVE TO FOLLOW THIS STEP TO USE TELNET C:\WINDOWS\TELNET [IP ADDRESS] PORT

FTP  FTP IS ONE TYPE OF PROTOCOL BUT SOME TIME IT IS USED AS HACKING TOOL  PORT 21 FOR THE FTP  FOR CONNECTING FTP WE NEED SOME FTP S/W KNOWN AS FTP CLIENT  FOR CONNECTING FTP SERVER YOU HAVE TO HAMMER THAT SERVER  COMMAND: C:\WINDOWS\FTP [IP ADDRESS]:PORT